Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 07:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/minetest/minetest/releases/download/5.6.1/minetest-5.6.1-win64.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
https://github.com/minetest/minetest/releases/download/5.6.1/minetest-5.6.1-win64.zip
Resource
win10v2004-20220901-en
General
-
Target
https://github.com/minetest/minetest/releases/download/5.6.1/minetest-5.6.1-win64.zip
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 89be75672cbed801 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2432880017" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998283" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2432880017" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2442255621" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998283" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375952759" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998283" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{86587DE2-0CDF-4C97-84E6-FB34AEE3373B}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BC5FABB0-6AFE-11ED-A0EE-DE60447A8195} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Modifies registry class 3 IoCs
Processes:
iexplore.exesvchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings iexplore.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{041C7165-18EC-4EC5-9AD4-D77D21FEDD80} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{4DFFB6BC-BB76-4577-B100-B7C85D87530A} svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 2436 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 3736 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3736 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2804 iexplore.exe 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
iexplore.exeIEXPLORE.EXEOpenWith.exepid process 2804 iexplore.exe 2804 iexplore.exe 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 2436 OpenWith.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2804 wrote to memory of 1660 2804 iexplore.exe IEXPLORE.EXE PID 2804 wrote to memory of 1660 2804 iexplore.exe IEXPLORE.EXE PID 2804 wrote to memory of 1660 2804 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/minetest/minetest/releases/download/5.6.1/minetest-5.6.1-win64.zip1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Desktop\minetest-5.6.1-win64\bin\minetest.exe"C:\Users\Admin\Desktop\minetest-5.6.1-win64\bin\minetest.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5416f43a5e5978e25d0b2b3804604f9eb
SHA171da8e406f52bb253c6b3932e24038dd593521a9
SHA256457ae2aca2600e218804f138f83fb6f5ee451a0694cff806f97f15f5b00b1917
SHA5120ece1d0ffa3cebd377155244da084f25206cda3ca499adf63eceab3b157598a2e290352120900563ece8938183b2a090dc527461eb4a197310abebb82103fecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
434B
MD577001cf34387d9c3cc9a501bb8f5bc2e
SHA17aab417aaae5f354b476ca38acf51d3a6573fdf0
SHA25689bb4fb868cd1b4ae7b5e0cafb24095849a05e154939b2362980ef770f50f67f
SHA5126bb25c232968a3667a5808d76ab00d2c15f33177fb8953d267f8c0569257d394940bb89efa213ada2b3c14750ec92b923f2d6777f717cf5fa47ebcdde4155f9b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\minetest-5.6.1-win64.zip.am5a01e.partialFilesize
18.2MB
MD51b787e4e36dd37d9ee28ddc0dc72ef94
SHA1b25d730507352b7476e70da79290a5b5befa4344
SHA256db6e8358e7f3ea2ae152b1824aef0d6f0312d8adc88f918fc4a1958990e89c27
SHA512b09f7b5da21bddd694b969161a120f146abc0cc515d5256ec252a5ad3c69f686f931c18a0b5bfdd1fab2796d05149fa665b3fbb7bf79e8a3dc39aa835705a040
-
C:\Users\Admin\Videos\Captures\desktop.iniFilesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c
-
memory/3092-139-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-140-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-142-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-143-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-144-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-149-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-150-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-151-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-154-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-157-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-164-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-165-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-166-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-167-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-168-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-169-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-170-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-172-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-174-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-177-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-179-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-185-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-187-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-192-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-193-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-195-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-198-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-197-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-196-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-194-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-191-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-190-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-189-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-188-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-186-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-184-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-183-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-182-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-181-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-180-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-178-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-176-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-175-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-173-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-171-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-163-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-162-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-161-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-160-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-159-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-158-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-156-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-155-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-153-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-152-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-148-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-147-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-146-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-145-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-141-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-138-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-137-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-136-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB
-
memory/3092-135-0x00007FF7C8CB0000-0x00007FF7C8CC0000-memory.dmpFilesize
64KB